Browse Results

Showing 33,476 through 33,500 of 54,029 results

Killer UX Design: Create User Experiences to Wow Your Visitors

by Jodie Moule

Today, technology is used to shift, sway and change attitudes and behavior. This creates amazing opportunities and challenges for designers. If we want to create products and services that have the power to educate people so they may live better lives, or help to reduce the time people take to do certain tasks, we first need an understanding of how these people think and work - what makes them "tick" The premise of this book is the need to understand how people "behave"; their habits, motivators and drivers, as a critical way to better understand what a great customer experience for your audience looks like, facilitating better design decisions. The book will lead you from understanding behavior, to extracting customer insights that can launch you into the design of something that makes a difference to people's lives - all presented in a fun, practical and non-academic way.

Applied Data Visualization with R and ggplot2: Create useful, elaborate, and visually appealing plots

by Dr Tania Moulik

Develop informative and aesthetic visualizations that enable effective data analysis in less timeKey FeaturesDiscover structure of ggplot2, grammar of graphics, and geometric objectsStudy how to design and implement visualization from scratchExplore the advantages of using advanced plotsBook DescriptionApplied Data Visualization with R and ggplot2 introduces you to the world of data visualization by taking you through the basic features of ggplot2. To start with, you’ll learn how to set up the R environment, followed by getting insights into the grammar of graphics and geometric objects before you explore the plotting techniques.You’ll discover what layers, scales, coordinates, and themes are, and study how you can use them to transform your data into aesthetical graphs. Once you’ve grasped the basics, you’ll move on to studying simple plots such as histograms and advanced plots such as superimposing and density plots. You’ll also get to grips with plotting trends, correlations, and statistical summaries.By the end of this book, you’ll have created data visualizations that will impress your clients.What you will learnSet up the R environment, RStudio, and understand structure of ggplot2Distinguish variables and use best practices to visualize themChange visualization defaults to reveal more information about dataImplement the grammar of graphics in ggplot2 such as scales and facetingBuild complex and aesthetic visualizations with ggplot2 analysis methodsLogically and systematically explore complex relationshipsCompare variables in a single visual, with advanced plotting methodsWho this book is forApplied Data Visualization with R and ggplot2 is for you if you are a professional working with data and R. This book is also for students who want to enhance their data analysis skills by adding informative and professional visualizations. It is assumed that you know basics of the R language and its commands and objects.

Traversals: The Use of Preservation for Early Electronic Writing (The\mit Press Ser.)

by Stuart Moulthrop Dene Grigar

An exercise in reclaiming electronic literary works on inaccessible platforms, examining four works as both artifacts and operations.Many pioneering works of electronic literature are now largely inaccessible because of changes in hardware, software, and platforms. The virtual disappearance of these works—created on floppy disks, in Apple's defunct HyperCard, and on other early systems and platforms—not only puts important electronic literary work out of reach but also signals the fragility of most works of culture in the digital age. In response, Dene Grigar and Stuart Moulthrop have been working to document and preserve electronic literature, work that has culminated in the Pathfinders project and its series of “Traversals”—video and audio recordings of demonstrations performed on historically appropriate platforms, with participation and commentary by the authors of the works. In Traversals, Moulthrop and Grigar mine this material to examine four influential early works: Judy Malloy's Uncle Roger (1986), John McDaid's Uncle Buddy's Phantom Funhouse (1993), Shelley Jackson's Patchwork Girl (1995) and Bill Bly's We Descend (1997), offering “deep readings” that consider the works as both literary artifacts and computational constructs. For each work, Moulthrop and Grigar explore the interplay between the text's material circumstances and the patterns of meaning it engages and creates, paying attention both to specificities of media and purposes of expression.

Microsoft Dynamics 365 Extensions Cookbook

by Rami Mounla

More than 80 recipes to help you leverage the various extensibility features available for Microsoft Dynamics and solve problems easily About This Book • Customize, configure, and extend the vanilla features of Dynamics 365 to deliver bespoke CRM solutions fit for any organization • Implement business logic using point-and-click configuration, plugins, and client-side scripts with MS Dynamics 365 • Built a DevOps pipeline as well as Integrate Dynamics 365 with Azure and other platforms Who This Book Is For This book is for developers, administrators, consultants, and power users who want to learn about best practices when extending Dynamics 365 for enterprises. You are expected to have a basic understand of the Dynamics CRM/365 platform. What You Will Learn • Customize, configure, and extend Microsoft Dynamics 365 • Create business process automation • Develop client-side extensions to add features to the Dynamics 365 user interface • Set up a security model to securely manage data with Dynamics 365 • Develop and deploy clean code plugins to implement a wide range of custom behaviors • Use third-party applications, tools, and patterns to integrate Dynamics 365 with other platforms • Integrate with Azure, Java, SSIS, PowerBI, and Octopus Deploy • Build an end-to-end DevOps pipeline for Dynamics 365 In Detail Microsoft Dynamics 365 is a powerful tool. It has many unique features that empower organisations to bridge common business challenges and technology pitfalls that would usually hinder the adoption of a CRM solution. This book sets out to enable you to harness the power of Dynamics 365 and cater to your unique circumstances. We start this book with a no-code configuration chapter and explain the schema, fields, and forms modeling techniques. We then move on to server-side and client-side custom code extensions. Next, you will see how best to integrate Dynamics 365 in a DevOps pipeline to package and deploy your extensions to the various SDLC environments. This book also covers modern libraries and integration patterns that can be used with Dynamics 365 (Angular, 3 tiers, and many others). Finally, we end by highlighting some of the powerful extensions available. Throughout we explain a range of design patterns and techniques that can be used to enhance your code quality; the aim is that you will learn to write enterprise-scale quality code. Style and approach This book takes a recipe-based approach, delivering practical examples and use cases so that you can identify the best possible approach to extend your Dynamics 365 deployment and tackle your specific business problems.

Advancing into Analytics: From Excel To Python And R

by George Mount

Data analytics may seem daunting, but if you're an experienced Excel user, you have a unique head start. With this hands-on guide, intermediate Excel users will gain a solid understanding of analytics and the data stack. By the time you complete this book, you'll be able to conduct exploratory data analysis and hypothesis testing using a programming language.Exploring and testing relationships are core to analytics. By using the tools and frameworks in this book, you'll be well positioned to continue learning more advanced data analysis techniques. Author George Mount, founder and CEO of Stringfest Analytics, demonstrates key statistical concepts with spreadsheets, then pivots your existing knowledge about data manipulation into R and Python programming.This practical book guides you through:Foundations of analytics in Excel: Use Excel to test relationships between variables and build compelling demonstrations of important concepts in statistics and analyticsFrom Excel to R: Cleanly transfer what you've learned about working with data from Excel to RFrom Excel to Python: Learn how to pivot your Excel data chops into Python and conduct a complete data analysis

Modern Data Analytics in Excel: Using Power Query, Power Pivot, And More For Enhanced Data Analytics

by George Mount

If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains. And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reporting

Practical Data Science with R, Second Edition

by John Mount Nina Zumel

Summary Practical Data Science with R, Second Edition takes a practice-oriented approach to explaining basic principles in the ever expanding field of data science. You&’ll jump right to real-world use cases as you apply the R programming language and statistical analysis techniques to carefully explained examples based in marketing, business intelligence, and decision support. About the technology Evidence-based decisions are crucial to success. Applying the right data analysis techniques to your carefully curated business data helps you make accurate predictions, identify trends, and spot trouble in advance. The R data analysis platform provides the tools you need to tackle day-to-day data analysis and machine learning tasks efficiently and effectively. About the book Practical Data Science with R, Second Edition is a task-based tutorial that leads readers through dozens of useful, data analysis practices using the R language. By concentrating on the most important tasks you&’ll face on the job, this friendly guide is comfortable both for business analysts and data scientists. Because data is only useful if it can be understood, you&’ll also find fantastic tips for organizing and presenting data in tables, as well as snappy visualizations. What's inside Statistical analysis for business pros Effective data presentation The most useful R tools Interpreting complicated predictive models About the reader You&’ll need to be comfortable with basic statistics and have an introductory knowledge of R or another high-level programming language. About the author Nina Zumel and John Mount founded a San Francisco–based data science consulting firm. Both hold PhDs from Carnegie Mellon University and blog on statistics, probability, and computer science.

WebLogic: The Definitive Guide

by Jon Mountjoy Avinash Chugh

BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the WebLogic platform, providing a stable framework for building scalable, highly available, and secure applications. In fact, in the long list of WebLogic's strengths and features, only one shortcoming stands out: the documentation that comes with the WebLogic server often leaves users clamoring for more information.WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Providing in-depth coverage of the WebLogic server, the book takes the concept of "definitive" to a whole new level. Exhaustive treatment of the WebLogic server and management console answers any question that developers or administrators might think to ask. Developers will find a useful guide through the world of WebLogic to help them apply their J2EE expertise to build and manage applications. Administrators will discover all they need to manage a WebLogic-based setup. And system architects will appreciate the detailed analysis of the different system architectures supported by WebLogic, the overall organization of a WebLogic domain and supporting network infrastructure, and more.WebLogic: The Definitive Guide is divided into three sections that explore WebLogic and J2EE, Managing the WebLogic Environment, and WebLogic Enterprise APIs. Some of the topics covered in this comprehensive volume include:Building web applications on the WebLogic Server Building and optimizing RMI applications Using EJBs with WebLogic, including CMP entity beans Packaging and deploying applications Understanding WebLogic's support for clustering Performance tuning and related configuration settings Configuring WebLogic's SSL support Maximizing WebLogic's security features Building web services with XML Using WebLogic's JMX services and MBeans Anyone who has struggled with mastering the WebLogic server will appreciate the thorough, clearly written explanations and examples in this book. WebLogic: The Definitive Guide is the definitive documentation for this popular J2EE application server.

Hands-On IoT Solutions with Blockchain: Discover how converging IoT and blockchain can help you build effective solutions

by Enio Moura Maximiliano Santos

This book is targeted towards IoT analyst, architects and engineers, or any stakeholder who is responsible for security mechanism on an IoT infrastructure. This book is also for IT professionals who want to start developing solutions using Blockchain and Internet of Things using IBM Cloud Platform. Basic understanding of IoT can be an added advantage.

Automated Deduction – CADE 26: 26th International Conference on Automated Deduction, Gothenburg, Sweden, August 6–11, 2017, Proceedings (Lecture Notes in Computer Science #10395)

by Leonardo Moura

This book constitutes the proceeding of the 26th International Conference on Automated Deduction, CADE-26, held in Gothenburg, Sweden, in August 2017. The 26 full papers and 5 system descriptions presented were carefully reviewed and selected from 69 submissions. CADE is the major forum for the presentation of research in all aspects of automated deduction, including foundations, applications, implementations and practical experience. The chapter 'Certifying Confluence of Quasi-Decreasing Strongly Deterministic Conditional Term Rewrite Systems' is published open access under a CC BY 4. 0 license.

Image Watermarking Techniques (Synthesis Lectures on Engineering, Science, and Technology)

by Talbi Mourad

This book investigates the image watermarking domain, analyzing and comparing image watermarking techniques that exist in current literature. The author’s goal is to aid researchers and students in their studies in the vast and important domain of image watermarking, including its advantages and risks. The book has three chapters: image watermarking using data compression; speech modulation for image watermarking; and secure image watermarking based on LWT and SVD.In addition, this book: Investigates the image watermarking domain, analyzing and comparing current image watermarking techniquesIncludes detail on image encryption and mathematical tools used for image watermarkingCovers image watermarking using data compression, speech modulation for image watermarking, and more

The Stationary Bionic Wavelet Transform and its Applications for ECG and Speech Processing (Signals and Communication Technology)

by Talbi Mourad

This book first details a proposed Stationary Bionic Wavelet Transform (SBWT) for use in speech processing. The author then details the proposed techniques based on SBWT. These techniques are relevant to speech enhancement, speech recognition, and ECG de-noising. The techniques are then evaluated by comparing them to a number of methods existing in literature. For evaluating the proposed techniques, results are applied to different speech and ECG signals and their performances are justified from the results obtained from using objective criterion such as SNR, SSNR, PSNR, PESQ , MAE, MSE and more.

Blockchain and Machine Learning for IoT Security

by Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, and Said Benkirane

The Internet of Things (IoT) involves physical devices, cars, household appliances, and any other physical appliance equipped with sensors, software, and network connections to gather and communicate data. Nowadays, this technology is embedded in everything from simple smart devices, to wearable equipment, to complex industrial machinery and transportation infrastructures. On the other hand, IoT equipment has been designed without considering security issues. Consequently, there are many challenges in terms of protection against IoT threats, which can lead to distressing situations. In fact, unlike other technological solutions, there are few standards and guidelines governing the protection of IoT technology. Moreover, few users are aware of the risks associated with IoT systems. Hence, Blockchain and Machine Learning for IoT Security discusses various recent techniques and solutions related to IoT deployment, especially security and privacy. This book addresses a variety of subjects, including a comprehensive overview of the IoT, and covers in detail the security challenges at each layer by considering how both the architecture and underlying technologies are employed. As acknowledged experts in the field, the authors provide remediation solutions for impaired security, as well as mitigation methods, and offer both prevention and improvement suggestions. Key Features: Offers a unique perspective on IoT security by introducing Machine Learning and Blockchain solutions Presents a well-rounded overview of the most recent advances in IoT security and privacy Discusses practical solutions and real-world cases for IoT solutions in various areas Provides solutions for securing IoT against various threats Discuses Blockchain technology as a solution for IoT This book is designed to provide all the necessary knowledge for young researchers, academics, and industry professionals who want to understand the advantages of artificial intelligence technology, machine learning, data analysis methodology, and Blockchain for securing IoT technologies.

Visual Privacy Management: Design and Applications of a Privacy-Enabling Platform (Lecture Notes in Computer Science #12030)

by Haralambos Mouratidis Paolo Giorgini Mattia Salnitri Jan Jürgens Loredana Mancini

​Privacy is a burden for most organizations, the more complex and wider an organization is, the harder to manage and enforce privacy is.GDPR and other regulations on privacy impose strict constraints that must be coherently enforced, considering also privacy needs of organization and their users. Furthermore, organizations should allow their users to express their privacy needs easily, even when the process that manages users' data is complex and involves multiple organizations.Many research work consider the problem using simplistic examples, with solutions proposed that never actually touch pragmatic problems of real, large organizations, with thousands of users and terabytes of personal and sensitive data.This book faces the privacy management problem targeting actual large organizations, such as public administrations, including stakeholders in the process of definition of the solution and evaluating the results with its actual integration in four large organizations. The contribution of this book is twofold: a privacy platform that can be customized and used to manage privacy in large organizations; and the process for the design of such a platform, from a state-of-the-art survey on privacy regulations, through the definition of its requirements, its design and its architecture, until the evaluation of the platform.

Cyber Physical Systems. Design, Modeling, and Evaluation: 5th International Workshop, CyPhy 2015, Amsterdam, The Netherlands, October 8, 2015, Proceedings (Lecture Notes in Computer Science #9361)

by Mohammad Reza Mousavi Christian Berger

This book constitutes the proceedings of the 5th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2015, held as part of ESWeek 2015, in Amsterdam, The Netherlands, in October 2015. The 10 papers presented in this volume were carefully reviewed and selected from 13 submissions. They broadly interpret, from a diverse set of disciplines, the modeling, simulation, and evaluation of cyber-physical systems.

Cyber Physical Systems. Design, Modeling, and Evaluation: 6th International Workshop, CyPhy 2016, Pittsburgh, PA, USA, October 6, 2016, Revised Selected Papers (Lecture Notes in Computer Science #10107)

by Mohammad Reza Mousavi Christian Berger Rafael Wisniewski

This book constitutes the proceedings of the 5th International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems, CyPhy 2015, held as part of ESWeek 2015, in Amsterdam, The Netherlands, in October 2015. The 10 papers presented in this volume were carefully reviewed and selected from 13 submissions. They broadly interpret, from a diverse set of disciplines, the modeling, simulation, and evaluation of cyber-physical systems.

Formal Techniques for Distributed Objects, Components, and Systems: 42nd IFIP WG 6.1 International Conference, FORTE 2022, Held as Part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022, Lucca, Italy, June 13–17, 2022, Proceedings (Lecture Notes in Computer Science #13273)

by Mohammad Reza Mousavi Anna Philippou

This book constitutes the refereed proceedings of the 42nd IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2022, held in Lucca, Italy, in June 2022, as part of the 17th International Federated Conference on Distributed Computing Techniques, DisCoTec 2022.The 12 regular papers presented were carefully reviewed and selected from 28 submissions. They cover topics such as: software quality, reliability, availability, and safety; security, privacy, and trust in distributed and/or communicating systems; service-oriented, ubiquitous, and cloud computing systems; component-and model-based design; object technology, modularity, and software adaptation; self-stabilisation and self-healing/organising; and verification, validation, formal analysis, and testing of the above.

Topics in Theoretical Computer Science

by Mohammad Reza Mousavi Jiří Sgall

This book constitutes the refereed proceedings of the Second IFIP WG 1. 8 International Conference on Topics in Theoretical Computer Science, TTCS 2017, held in Tehran, Iran, in September 2017. The 8 papers presented in this volume were carefully reviewed and selected from 20 submissions. They were organized in topical sections named: algorithms and complexity; and logic, semantics, and programming theory.

Mediated Identities and New Journalism in the Arab World

by Mohamed Ben Moussa Aziz Douai

This book looks into the role played by mediated communication, particularly new and social media, in shaping various forms of struggles around power, identity and religion at a time when the Arab world is going through an unprecedented period of turmoil and upheaval. The book provides unique and multifocal perspectives on how new forms of communication remain at the centre of historical transformations in the region. The key focus of this book is not to ascertain the extent to which new communication technologies have generated the Arab spring or led to its aftermaths, but instead question how we can better understand many types of articulations between communication technologies, on the one hand, and forms of resistance, collective action, and modes of expression that have contributed to the recent uprisings and continue to shape the social and political upheavals in the region on the other. The book presents original perspectives and rigorous analysis by specialists and academics from around the world that will certainly enrich the debate around major issues raised by recent historical events.

Advances in Smart Technologies Applications and Case Studies: Selected Papers from the First International Conference on Smart Information and Communication Technologies, SmartICT 2019, September 26-28, 2019, Saidia, Morocco (Lecture Notes in Electrical Engineering #684)

by Ali El Moussati Kidiyo Kpalma Mohammed Ghaouth Belkasmi Mohammed Saber Sylvain Guégan

This book offers a comprehensive snapshot of practically-relevant developments in the field of smart information technologies. Including selected papers presented at the First International Conference on Smart Information and Communication Technologies, SmartICT 2019, held on September 26-28, in 2019, Saidia, Morocco, it reports on practical findings, and includes useful tutorials concerning current technologies and suggestions to improve them. It covers a wide range of applications, from health and energy management, to digital education, agriculture and cybersecurity, providing readers with a source of new ideas for future research and collaborations.

Introduction to Problem-Based Learning (Routledge-Noordhoff International Editions)

by Jos Moust Peter Bouhuijs Henk Schmidt

Introduction to Problem-based Learning teaches students how to work with the problem-based learning method, which requires mainly self-directed learning. Particular attention is given to the necessary skills to apply this method effectively. Why Introduction to Problem-based Llearning? • comprehensible introduction in the problem-based learning method • enables students to experience the full potential of this concept • discusses the use of digital devices Introduction to Problem-based learning provides students with the necessary skills to operate within as well as outside problem-based groups. It discusses issues like: How do you take on a problem? How do you collaborate with others? How do you deal with cultural diversity? How do you lead a tutorial group? How can you organize your studies best? Special attention is given to the use of computers, tablets and internet in a problem-based environment.

Microsoft Dynamics AX 2012 R3 Security

by Ahmed Mohamed Moustafa

If you are a developer or IT administrator with background experience in a programming language with X++ and the MorphX development tool, this book is for you. The book assumes familiarity with basic security terminologies and the basics of Dynamics AX.

Microsoft Dynamics AX 2012 Security - How to

by Ahmed Mohamed Moustafa

Written in simple, easy to understand format with lots of screenshots and insightful tips and hints. If you are an AX implementer, AX developer, network administrator or IT Person charged with configuring Dynamics AX2012 in your company, then this book is for you. The book assumes that you are familiar with the basic security terminologies. Also. the book provides you with a good overview and covers details that makes it suitable for beginners, intermediate and advanced readers.

Media Networks: Architectures, Applications, and Standards

by Hassnaa Moustafa Sherali Zeadally

A rapidly growing number of services and applications along with a dramatic shift in users' consumption models have made media networks an area of increasing importance. Do you know all that you need to know?Supplying you with a clear understanding of the technical and deployment challenges, Media Networks: Architectures, Applications, and Standard

Digital Forensics in the Era of Artificial Intelligence

by Nour Moustafa

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

Refine Search

Showing 33,476 through 33,500 of 54,029 results